CVE-2025-38715
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-09-04

Last updated on: 2026-03-17

Assigner: kernel.org

Description
In the Linux kernel, the following vulnerability has been resolved: hfs: fix slab-out-of-bounds in hfs_bnode_read() This patch introduces is_bnode_offset_valid() method that checks the requested offset value. Also, it introduces check_and_correct_requested_length() method that checks and correct the requested length (if it is necessary). These methods are used in hfs_bnode_read(), hfs_bnode_write(), hfs_bnode_clear(), hfs_bnode_copy(), and hfs_bnode_move() with the goal to prevent the access out of allocated memory and triggering the crash.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-09-04
Last Modified
2026-03-17
Generated
2026-05-07
AI Q&A
2025-09-04
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
linux kernel 5.10.244-1
linux kernel 6.1.153-1
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-UNKNOWN
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a slab-out-of-bounds issue in the Linux kernel's HFS filesystem code, specifically in the hfs_bnode_read() function. It occurs when the code accesses memory beyond what is allocated, which can lead to crashes. The fix involves adding methods to validate and correct the requested offset and length to prevent out-of-bounds memory access.


How can this vulnerability impact me? :

This vulnerability can cause the Linux kernel to crash due to out-of-bounds memory access in the HFS filesystem code. Such crashes can lead to denial of service or system instability.


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, update the Linux kernel to a version that includes the patch fixing the slab-out-of-bounds issue in hfs_bnode_read(). This patch introduces validation methods to prevent out-of-bounds memory access. Applying the latest kernel updates from your distribution is the recommended immediate step.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart